If this is your first visit, be sure to
check out the FAQ by clicking the
link above. You may have to register
before you can post: click the register link above to proceed. To start viewing messages,
select the forum that you want to visit from the selection below.

"breaking in" and actually achieving anything are two entirely different scenarios, unless you consider defacing their sites with "hello kitty" to be an achievement.

Financial institutions have rather more complex and in depth security than you seem to realise, a lot of which is aimed at the enemy within (employee fraud prevention). If you try messing around you will fall foul of it pretty quickly.

The only risk attached to a loan is the possibility of the borrower defaulting on the payments, hence the marvelous US invention of the "sub-prime" loans market for which the World is truly grateful.

You wouldn't be that CPA who fled to the Bahamas with accounts payable would you?

And if you think about it, encryption isn't the answer, as it is intended for the protection of data that are in transit.

I get sick and tired of being a nice guy. Instead of sitting here picking your noses... you guys should fallow suit. The business interests that control the government also control most media outlets (including the internet).

When you threaten the status quo a company like QuinStreet Inc. is always there to snuff it out. How do you fight back? Troll. Be disruptive and destructive. Expose information. Ruin websites. Make the internet a completely unsafe and unprofitable place.

You come on here and post a list of names, addresses and other personal details.

1. How do I know that they are genuine?
2. How do I know that you obtained them rather than just c&p from some webscum site?

I have banned two Russian sleazeballs this week for trying to sell that information, and I can have "samples".

I can well believe your proposition that there are a lot of operations out there that are as solid as Swiss cheese, but we need to know where the leaks are happening?

A list of details (just a dozen or so would have made the point BTW) says nothing, without knowing where they came from and how they were obtained?

You need to state:

1. Which organisation is compromised
2. What the vulnerability was.
3. What exploit was used.

And for God's sake redact the bloody personal details!!! ( like stick a "*" in the SSN etc?)

Otherwise it might all have come from one of my moles in the IRS? or from Boris Bollockbrain in Outer Unpronounceable?

And if you think that things are bad in Georgia, just try Canada mate............ the RCMP don't even accept crime reports over the internet..... errr, you wouldn't happen to have two bean cans and a very long stretch of wire would you?)